cvelist/2020/10xxx/CVE-2020-10620.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2020-03-16 14:01:16 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10620",
2020-05-14 21:01:25 +00:00
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Opto 22 SoftPAC Project",
"version": {
"version_data": [
{
"version_value": "SoftPAC Project Version 9.6 and prior"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "IMPROPER AUTHORIZATION CWE-285"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-135-01",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-135-01"
}
]
2020-03-16 14:01:16 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-05-14 21:01:25 +00:00
"value": "Opto 22 SoftPAC Project Version 9.6 and prior. SoftPAC communication does not include any credentials. This allows an attacker with network access to directly communicate with SoftPAC, including, for example, stopping the service remotely."
2020-03-16 14:01:16 +00:00
}
]
}
}